MAIN PAGE
> Back to contents
National Security
Reference:
Yurchenko, A.V.
For the future managers on the need
to take into account the security functions
when managing a business.
// National Security.
2014. № 1.
P. 128-142.
URL: https://en.nbpublish.com/library_read_article.php?id=63901
Yurchenko, A.V. For the future managers on the need
to take into account the security functions
when managing a business.
Abstract:
The object of study is the further
development of the optional course “Security of entrepreneurial activity” for a wide range of
students at the National Research University —
Higher School of Economics. The author
has developed a new course “Managing the
business security systems’ especially for the
4th y ear s tudents f or t he B achelor’s d egree a t
the management faculty. The methodologically
organized studies show the possibility for the
adaptation of the interdisciplinary course for
the specialized audience. Just like the previous
course, the “Managing the business security
systems “course is developed for the first time.
The competence, which the students have
gained during their third year of studies have
formed a sufficient basis for the studies within
the framework of this course. The experience
shows that in the near future the authors
shall negotiate with their colleagues having
related course in order to provide a qualified
solution of connecting disciplines and mutual
complementing of courses. The measures are
taken to develop several study disciplines on
business security, which may logically continue
the professional study programs for the students
of one specialty, allowing to provide the students
with additional spheres of competence, which
they could use efficiently in their practical
activities after graduation.
Keywords:
entrepreneurial activities, business, management, marketing, security systems, complex security of an enterprise, target audience, competences, Bachelor’s program, decomposition principle.
This article can be downloaded freely in PDF format for reading. Download article
This article written in Russian. You can find original text of the article here
.
References
1. Avdiyskiy V.I., Dadalko V.A. Tenevaya ekonomika i ekonomicheskaya bezopasnost' gosudarstva. 2010. M. Al'fa-M;
2. Androshchuk V.V. O vozmozhnosti ispol'zovaniya v rossiyskikh usloviyakh opyta i rekomendatsiy ob'edineniy zarubezhnykh revizorov po protivodeystviyu moshennichestvu i khishcheniyam. NB/NB, № 3 (26). 2013;
3. Astakhov P.A. Protivodeystvie reyderskim zakhvatam. 2008. M. EKSMO;
4. Borisov Yu.D. Reyderskie zakhvaty. Uzakonennyy razboy. 2008. M.-SPb. Piter;
5. Bregg S. Sliyaniya i pogloshcheniya. Prakticheskoe rukovodstvo. 2011. M. Maroseyka;
6. Gorokhova D.I. Konventsiya Soveta Evropy o zashchite fizicheskikh lits pri avtomatizirovannoy obrabotke personal'nykh dannykh. NB/NB, № 1 (24). 2013;
7. Daft R. Menedzhment. 2011. M.-SPb. Piter;
8. Kiselev N.S. Preventivnaya zashchita ot reyderskikh atak. NB/NB, № 1 (24). 2013;
9. Krivenko S.G. Ispol'zovanie ofshornykh kompaniy v tselyakh provedeniya somnitel'nykh finansovykh operatsiy i pravovye riski kontragentov dannykh kompaniy. NB/NB, № 1 (24). 2013;
10. Men'shakov Yu.K. Teoreticheskie osnovy tekhnicheskikh razvedok. 2008. M. MGTU;
11. Men'shakov Yu.K. Vidy i sredstva inostrannykh tekhnicheskikh razvedok. 2009. M. MGTU;
12. Men'shakov Yu.K. Osnovy zashchity ot tekhnicheskikh razvedok. 2011. M. MGTU;
13. Obespechenie informatsionnoy bezopasnosti biznesa. Pod redaktsiey Kurilo A.P. 2011. M. Al'pina;
14. Rudyk N.B. Metody zashchity ot vrazhdebnogo pogloshcheniya. 2008. M. Delo;
15. Shul'ts V.L., Tsyganov V.V. Modernizatsiya sistemy natsional'noy bezopasnosti. 2010. M. Nauka;
16. Yurchenko A.V. Ob opyte organizatsii obshcheuniversitetskogo fakul'tativa po voprosam obespecheniya bezopasnosti predprinimatel'skoy deyatel'nosti v natsional'nom issledovatel'skom universitete «Vysshaya shkola ekonomiki». NB/NB, № 1 (24). 2013;
17. Yurchenko A.V., Rudchenko A.D. Programma distsipliny «Upravlenie sistemami bezopasnosti biznesa» (na 2013-2014 uchebnyy god). NIU VShE. 2013.
Link to this article
You can simply select and copy link from below text field.
|